During a cyber incident, which of the following is the BEST course of action?
During a cyber incident, which of the following is the BEST course of action?A . Switch to using a pre-approved, secure, third-party communication system. B. Keep the entire company informed to ensure transparency and integrity during the incident. C. Restrict customer communication until the severity of the breach is confirmed....
Which of the following technical controls would BEST accomplish this goal?
An organization needs to limit its exposure to accidental disclosure when employees send emails that contain personal information to recipients outside the company. Which of the following technical controls would BEST accomplish this goal?A . DLP B. Encryption C. Data masking D. SPFView AnswerAnswer: C
Which of the following should the analyst provide an assessment of?
An analyst has been asked to provide feedback regarding the control required by a revised regulatory framework. At this time, the analyst only needs to focus on the technical controls . Which of the following should the analyst provide an assessment of?A . Tokenization of sensitive data B. Establishment o'...
Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in the future?
During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity was initiated from an internal IP going to an external website. Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in...
Which of the following is the BEST mitigation to prevent unauthorized access?
A SIEM solution alerts a security analyst of a high number of login attempts against the company's webmail portal. The analyst determines the login attempts used credentials from a past data breach. Which of the following is the BEST mitigation to prevent unauthorized access?A . Single sign-on B. Mandatory access...
Which of the following is MOST likely an attack vector that is being utilized as part of the testing and assessment?
An analyst is performing penetration testing and vulnerability assessment activities against a new vehicle automation platform. Which of the following is MOST likely an attack vector that is being utilized as part of the testing and assessment?A . FaaS B. RTOS C. SoC D. GPS E. CAN busView AnswerAnswer: E
Which of the following Nmap commands would BEST accomplish this goal?
A security analyst needs to assess the web server versions on a list of hosts to determine which are running a vulnerable version of the software and output that list into an XML file named webserverlist.xml. The host list is provided in a file named webserverlist.txt . Which of the...
A security analyst is building a malware analysis lab. The analyst wants to ensure malicious applications are not capable of escaping the virtual machines and pivoting to other networks.
A security analyst is building a malware analysis lab. The analyst wants to ensure malicious applications are not capable of escaping the virtual machines and pivoting to other networks. To BEST mitigate this risk, the analyst should use.A . an 802.11ac wireless bridge to create an air gap. B. a...
Which of the following controls would have MOST likely prevented this incident?
Data spillage occurred when an employee accidentally emailed a sensitive file to an external recipient. Which of the following controls would have MOST likely prevented this incident?A . SSO B. DLP C. WAF D. VDIView AnswerAnswer: B Explanation: Reference: https://greenlightcorp.com/blog/cyber-security-solutions-data-spillage-and-how-to-create-an-after-incident-to-do-list/
Which of the following rules is the BEST solution?
A security administrator needs to create an IDS rule to alert on FTP login attempts by root . Which of the following rules is the BEST solution? A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: B